Introducing and Exploring the Extremist Cybercrime Database (ECCD)
暂无分享,去创建一个
[1] Thomas J. Holt,et al. Examining the Characteristics That Differentiate Jihadi-Associated Cyberattacks Using Routine Activities Theory , 2021, Social Science Computer Review.
[2] Kyung-shick Choi,et al. Mapping Global Cyberterror Networks: An Empirical Study of Al-Qaeda and ISIS Cyberterrorism Events , 2021, Journal of Contemporary Criminal Justice.
[3] A. Goldsmith,et al. Digital Drift and the “Sense of Injustice”: Counter-Productive Policing of Youth Cybercrime , 2019 .
[4] Thomas J. Holt,et al. Examining Ideologically Motivated Cyberattacks Performed by Far-Left Groups , 2019, Terrorism and Political Violence.
[5] David Maimon,et al. Cyber-Dependent Crimes: An Interdisciplinary Review , 2019, Annual Review of Criminology.
[6] B. Payne,et al. Using Labeling Theory as a Guide to Examine the Patterns, Characteristics, and Sanctions Given to Cybercrimes , 2018, American Journal of Criminal Justice.
[7] R. Spaaij. The Age of Lone Wolf Terrorism , 2017 .
[8] Joshua D. Freilich,et al. Exploring the Subculture of Ideologically Motivated Cyber-Attackers , 2017 .
[9] Richard Clayton,et al. Exploring the Provision of Online Booter Services , 2016 .
[10] T. Holt,et al. Cybercrime in Progress: Theory and prevention of technology-enabled offenses , 2015 .
[11] Joshua D. Freilich,et al. The future of terrorism research: a review essay , 2015 .
[12] Joshua D. Freilich,et al. Investigating the Applicability of Macro-Level Criminology Theory to Terrorism: A County-Level Analysis , 2015 .
[13] Joshua D. Freilich,et al. Criminology Theory and Terrorism: Introduction to the Special Issue , 2015 .
[14] Joshua D. Freilich,et al. Routine Activities and Right-Wing Extremists: An Empirical Comparison of the Victims of Ideologically- and Non-Ideologically-Motivated Homicides Committed by American Far-Rightists , 2015 .
[15] Jeff Gruenewald,et al. Introducing the United States Extremis Crime Database (ECDB) , 2014 .
[16] John Horgan,et al. Bombing Alone: Tracing the Motivations and Antecedent Behaviors of Lone-Actor Terrorists*,†,‡ , 2013, Journal of forensic sciences.
[17] T. Holt. Exploring the Intersections of Technology, Crime, and Terror , 2012 .
[18] Joshua D. Freilich,et al. American Terrorism and Extremist Crime Data Sources and Selectivity Bias: An Investigation Focusing on Homicide Events Committed by Far-Right Extremists , 2012 .
[19] Joshua D. Freilich,et al. Critical events in the life trajectories of domestic extremist white supremacist groups , 2009 .
[20] Joshua D. Freilich,et al. Surveying American State Police Agencies About Terrorism Threats, Terrorism Sources, and Terrorism Definitions , 2009 .
[21] Gary LaFree,et al. Introducing the Global Terrorism Database , 2007 .
[22] T. Holt. subcultural evolution? examining the influence of on- and off-line experiences on deviant subcultures , 2007 .
[23] Joseph R. Dominick,et al. Hackers: Militants or Merry Pranksters? A Content Analysis of Defaced Web Pages , 2004 .
[24] Joshua D. Freilich,et al. How social movement organizations explicitly and implicitly promote deviant behavior: The case of the militia movement , 1999 .
[25] Victoria A. Jangada Correia,et al. An Explorative Study into the Importance of Defining and Classifying Cyber Terrorism in the United Kingdom , 2022, SN Comput. Sci..